CHAPTER 2 Running Adaptive Server IQ
27
See “Using command-line switches” on page 28 for a description of
commonly used startup parameters.
Note
To start the server without starting any database, you omit the database
file from the
asiqsrv12
command and specify a servername. See “Naming the
server and databases” on page 31 for a discussion of why it is preferable to
include both the database and server in the startup command.
If you supply no switches and no database file on Windows NT, a dialog box
is displayed, allowing you to use a Browse button to locate your database file.
To start the server in a separate session, use the Windows NT
start
command:
start asiqsrv12 [
server-switches ] database [
database-switches ]
Running the server outside the current session
When you log on to a computer using a user ID and a password, you establish
a session. When you start a database server, or any other application, it runs
within that session. When you log off the computer, all applications associated
with the session terminate.
In a production environment, IQ database servers must be available all the
time. To make this easier, you can run Adaptive Server IQ in such a way that,
when you log off the computer, the database server remains running. The way
you do this depends on your operating system.
•
Windows NT service
You can run the Windows NT database server
as a service. This has many convenient properties for running high
availability servers.
•
UNIX daemon
You can run the UNIX database server as a daemon by
using the
-ud
command-line option, enabling the database server to run in
the background, and to continue running after you log off.
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...